Go to Export Home Go to Information Page Go to Decision Tree Go to Glossary Go to FAQ Page Go to Contact Page

Exporting Goods and Technology: Section 1

Controlled Goods and Technology*

The U.S. government controls a wide variety of goods and technology on several lists. Generally, any technical data* which provides insight into the development, production, or use of controlled articles will also be controlled.

Technical data* developed or modified for military or space applications is controlled by the International Traffic in Arms Regulations (ITAR)* and will likely need a license to be exported. Controlled goods and technology* in the ITAR* are listed in the U.S. Munitions List (USML)*. Briefing on ITAR in PowerPoint for an overview of ITAR regulations.

The largest list of controlled goods and technology* is covered by the Export Administration Regulations (EAR). They are listed in the U.S. Export Commodity Control List (ECCL)*. The EAR covers dual-use goods and technology - items that are commercial in nature but could have military applications. For more information on the EAR and ECCL, click here or here.

Samples of controlled goods and technology* (list is not inclusive):


  • Toxicological agents
  • Nuclear materials and technology
  • Lasers and Sensors
  • Night vision equipment
  • Arms and ammunition
  • Semiconductors and microprocessors
  • Telecommunications
  • Missile technology
  • Navigation and avionics
  • Marine vessels
  • GPS technology
  • Weapons and Ammunition
  • Countermeasure technology on controlled goods
  • Endangered Species
  • Body armor and protective gear
  • Fingerprint and identification retrieval
  • Oscilloscopes
  • Gas centrifuges
  • Mass Spectrometers
  • High strength materials

Contact UC's Export Control Team for assistance in determining the correct export commodity classification.

Software is deemed to be in the public domain* when the source code is published. Software that is designed for military, space, underwater, or controlled technologies* will be controlled from export*.

Legitimate exports* of software must still be tagged with a Destination Control Statement*.

Note on Encryption:


  • Symmetric encryption software and technology with key lengths of 56-bits or higher may require a license for export*.
  • Asymmetric Encryption software and technology with key lengths of 512-bits or more for RSA or D-H, or 112-bit or more for Elliptic Curve, may require a license for export*.





 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

For Help at anytime, contact the Export Control Team at (513) 558-ISEC or via e-mail at InfoSec@uc.edu

Throughout the Export Controls section of the website, whenever you see a *, hover over it for a brief definition of the term. Click on the asterix to be taken to the full definition on the glossary page. The Glossary page also includes lnks to applicable regulations and additional information and links.